Home Blog Page 669

Twitter’s Chargeback System Measures Resource Use and Sends Out a Bill

Twitter runs on a massively complex infrastructure running thousands of services, so small efficiencies result in large gains. But figuring out how to measure performance is a giant problem in a system this complex, as is giving Twitter’s teams the incentive and tools to improve resource allocation. Vinu Charanya and Michael Benedict’s talk at LinuxCon North America goes into fascinating detail on the metering and chargeback system Twitter engineers built to solve this problem, using both a technical and social approach.

One of the events responsible for the creation of this system was the 2010 World Cup. Twitter engineers anticipated several times greater demand and scaled up to meet it. But the scale-up was not entirely successful. This resulted in a fundamental architecture change, breaking down functionality into multiple independent microservices.

In 2014, Ellen DeGeneres tweeted a selfie from the Oscars podium, which exposed additional weaknesses in the system. It was retweeted so many times and so fast that the original tweet became inaccessible for over an hour. Diagnosing exactly what went wrong was not easy. Benedict says, “Given the scale and size of Twitter, it’s important to really understand what is really the overall use of infrastructure platform resources across all of these services. How do you know who’s really using what? Given these number of services and number of teams at Twitter, it’s extremely important to understand how we can start capturing the utilization of resources per team, per project, per hour. Finally, how do you really incentivize the right behavior for these engineers, the team leads, the managers, to do the right thing in using our resources?”

Four Challenges

Vinu Charanya describes the Chargeback system that they built to address these problems. She says, “Chargeback provides the ability to track and measure infrastructure usage on a per engineering team basis and charge each owner their usage cost accordingly. Keeping this in mind as we started designing the system, we identified the top four challenges.

“Number one: service identity. We designed a generic service identification abstraction that provides a canonical way to identify a service across infrastructures.

“Number two: resource catalog. We worked with the infrastructure teams to identify and abstract resources that can be published for developers to consume and build.

“Number three: metering. Each infrastructure graphs the consumption of resources by each service through their service identifiers. We built a classic ETL data pipeline to collect all the usage metrics to aggregate and process them in a central location.

“Number four: service metadata. We also built a service metadata system that keeps track of ops and other service-related metadata.”

The end result of Chargeback is three reports for users: a Chargeback bill, an infrastructure profit-and-loss report, and a budgeting report.

Chargeback not only gives Twitter teams measurements of their resource usage and real-world costs, it is also an amazing tool for understanding exactly what is happening inside this huge, fast-moving, interdependent system. Watch Charanya and Benedict’s talk (below) to learn more about the tools and architecture of this most bleeding-edge of techologies.

LinuxCon videos

Free Webinar: How Shared Development Is Driving the Automotive Industry

The Linux Foundation’s Automotive Grade Linux (AGL) project is hosting a free webinar called “Open Source Automotive: How Shared Development Will Drive the Industry Forward.” The hour-long event, which starts at 11am on Wednesday, November 9, will be led by Dan Cauchy, Executive Director of the Automotive Grade Linux project at The Linux Foundation.

The webinar will reveal how AGL’s Unified Code Base (UCB) 2.0, which was released in July, is bringing together automotive manufacturers and suppliers to develop an open connected car platform that can serve as a de facto standard for automotive computing. The current focus is on in-vehicle infotainment, but this is quickly moving toward more comprehensive digital cockpit and assisted driving technology.

AGL’s UCB is necessary, says Cauchy, because the traditional automotive supply chain model has failed to keep up with digital technology.

“Consumers have come to expect their personal devices to be intuitive and user-friendly, and they want that experience to extend into the vehicle,” Cauchy told Linux.com. “In-car connectivity and infotainment systems have not kept pace with smartphone technology primarily because automotive software is fragmented.

“AGL’s goal is to eliminate this fragmentation by building a single software platform for the entire industry,” he said. “Adopting an open platform will lead to more software reuse, enabling shorter production cycles and more rapid innovation.” 

The webinar is a warm-up for a larger AGL Demonstration Showcase to be held January 4-7 at the CES show in Las Vegas. The showcase will include an AGL Demo Suite held on January 5-6 that will showcase a broader range of application developers who use the AGL/UCB codebase.

AGL announced a new round of members in September, including AutoIO Technology (instrument clusters), Irdeto (security technology), Link Motion (IVI), Pocket Soft (RTPatch software updating tools), sdtech (HMI and system design), and Synopsys (automotive-specific IC design and verification tools, and security software). Automotive security is a common theme among all the new members’ solutions.

More than 40 new companies have joined AGL in the past year, bringing the member total to more than 80. Automotive manufacturers like Ford, Honda, Jaguar Land Rover, Mazda, Mitsubishi Motors, Nissan, Subaru, and Toyota, have been joined by technology companies including Aisin AW, Codethink, Continental, DENSO, Fujitsu Ten, Harman, Mitsubishi Electric, NTT DATA MSE, Panasonic, Pioneer, Qualcomm, Renesas Electronics, Wind River, and others.

UCB 2.0 shipped with new rear seat display, video playback, and audio routing support, as well as a comprehensive application framework. At CES, we’ll see more information on UCB 3.0, which is expected to be released later this year.

“UCB 3.0 is the version we expect to see members put into production,” says Cauchy. “UCB 3.0 will also be the basis for the work we are starting on telematics, instrument cluster, heads up display (HUD), and advanced driver assistance systems (ADAS), which are on our roadmap for 2017.”

Learn more about how AGL and shared development are driving the auto industry forward. Join us Wednesday, Nov. 9, 2016 at 11 a.m. Pacific for this free webinar presented by Dan Cauchy. Register Now >>

Agile, DevOps and the Algorithmic Enterprise

The next big trends for technology leaders today are Agile, DevOps, and becoming data-driven ‘algorithmic enterprises’.

That’s the opinion of Mike Mason, technology activist and adviser to the CTO at ThoughtWorks. Speaking to Computing recently, Mason explained that an effective data strategy is needed to solve traditional problems around legacy applications and multiple, conflicting data sets.

“Against a backdrop of increasing speed of technological advancement – which is itself a challenge to which IT leaders must respond – the next big shift is to become a data-driven, algorithmic enterprise,” said Mason

Read more at V3

5 Terminal Commands Every Linux Newbie Should Know

I’m a big fan of the anime series Neon Genesis Evangelion. One of the quotes from it that stands out in my head is, “Man fears the darkness, and so he scrapes away at the edges of it with fire.” For newcomers to the world of Linux, the black screen of the terminal can seem like a deep, foreboding darkness, which is desperately replaced by a GUI whenever possible. It doesn’t have to be that way.

A graphical user interface makes modern computing more enjoyable and easier to use the majority of the time. After all, placing an Amazon order using a text-mode browser in a terminal sounds like an over-enthusiastic exercise in masochism. We like our GUIs and graphical browsers, but there are times when you’ll find yourself in the world of the command line. Like any new tool, knowing a few basics can keep your blood pressure in check when a GUI fails to start, or you need to perform maintenance.

Read more at PCWorld

How to Generate a Strong Password from the Linux Command Line

Having a strong password is one of the most important things you need to have in order to secure your Linux system. There are a lot of methods for generating a strong password. In this tutorial, you’ll learn how to generate a strong password via the Linux CLI.

If you don’t already have a strong password, pick a method and generate one ASAP.

How to generate a strong password through the command line

Using these command line tools is a secure (and fun) way of generating a strong password.

‘Open Source’ Is Not ‘Free Software’

Conflating ‘open source’ and ‘free software’ undermines free software.

In the open source universe, using terms such as FLOSS (Free/Libre and Open Source Software) is common and represents a casual conflation of the terms open source and free software, which are often used interchangeably. I would be remiss if I didn’t also admit that I have been guilty of same. I won’t be doing that anymore—or at least I’ll try not to—for a simple reason: Using the terms interchangeably is dangerous to the goals of free software and open media advocates (read “anti-DRM”). To continue this practice is to undermine beliefs that are fundamental to free software and associated movement.

Read more at OpenSource.com

Admins, Update Your Databases to Avoid the MySQL Bug

MySQL, MariaDB, and PerconaDB administrators need to check their database versions, as attackers can chain two critical vulnerabilities and completely take over the server hosting the database.

The two critical vulnerabilities, which can lead to arbitrary code execution, root privilege escalation, and server compromise, affect MySQL and forks like Percona Server, Percona XtraDB Cluster, and MariaDB, according to security researcher Dawid Golunski, who provided details of the vulnerability on LegalHackers. Administrators should install the latest updates as soon as possible, or in cases where the patches cannot be applied, they should disable symbolic link support within the database server configuration by setting symbolic-links=0 in my.cnf.

Read more at InfoWorld

Linus Torvalds Announces the Fourth RC of Linux Kernel 4.9, Things Are Still Big

Linus Torvalds announced the availability of the fourth RC (Release Candidate) development milestone of the upcoming Linux 4.9 kernel series.

According to Mr. Torvalds, who deliberately released the new Release Candidate version a day early than expected (again), the Linux kernel 4.9 RC4 release appeared to have already been big enough, which is due to the fact that there are a bunch of updated drivers, lots of networking fixes, as well as improvements for filesystems that triggered the bug in the new virtually mapped stacks.

“So I’m not going to lie: this is not a small RC, and I’d have been happier if it was. But it’s not unreasonably large for this (big) release either, so it’s not like I’d start worrying,” said Linus Torvalds. “I’m currently still assuming that we’ll end up with the usual seven Release Candidates, assuming things start calming down. We’ll see how that goes as we get closer to a release.”

Read more at Softpedia

Kali Linux – Fresh Installation Guide

Kali Linux is arguably one of the best out of the box Linux distributions available for security testing. While many of the tools in Kali can be installed in most Linux distributions, the Offensive Security team developing Kali has put countless hours into perfecting their ready to boot security distribution.

Kali Linux is a Debian based, security distribution. The distribution comes pre-loaded with hundreds of well known security tools and has gained quite a name for itself.

Kali even has an industry respected certification available called “Pentesting with Kali”. The certification is a rigorous 24 hour challenge in which applicants must successfully compromise a number of computers with another 24 hours to write up a professional penetration test report that is sent to and graded by the personnel at Offensive Security. Successfully passing this exam will allow the test taker to obtain the OSCP credential.

Read complete article at Tecmint

 

Keynote: Collaboration Beyond Code by Jilayne Lovejoy, Principal Open Source Counsel, ARM

Jilayne Lovejoy, Principal Open Source Counsel at ARM talks about collaboration beyond code with the OpenChain project at LinuxCon Europe.